×

Trusted intermediary for network layer claims-enabled access control

  • US 8,918,856 B2
  • Filed: 06/24/2010
  • Issued: 12/23/2014
  • Est. Priority Date: 06/24/2010
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus for use in a system comprising a computer in communication via at least one network with a network resource, the at least one network employing a network layer security protocol, the apparatus comprising:

  • at least one processor coupled to a memory, the at least one processor programmed to;

    (A) receive from the computer a request for access to the network resource and one or more requester claims describing attributes of one or more of the computer, a user of the computer, and a context in which access by the computer to the network resource is requested, the one or more requester claims being included in a communication formatted to comply with the network layer security protocol;

    (B) in response to receiving from the computer the request for access to the network resource, request from a claims provider, on behalf of the network resource, one or more resource claims, the one or more resource claims describing attributes of one or more of the network resource, an organization to which the network resource is affiliated, an owner of the network resource, a stage of deployment of the network resource, and a sensitivity of the network resource;

    (C) receive from the claims provider the one or more resource claims, the one or more resource claims being included in a communication formatted to comply with the network layer security protocol;

    (D) request an access control policy decision whether to grant or deny access by the computer to the network resource, the request providing information included in the one or more requester claims and the one or more resource claims, the request being included in a communication formatted to comply with the network layer security protocol, the access control policy decision being based at least in part on the information and an access control policy that is dynamically generated;

    (E) receive an access control policy decision indicating that access by the computer to the network resource is granted; and

    (F) removing the one or more requester claims from the request before sending the request to the network resource in accordance with a second protocol.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×